EP2741214A1 - Système de mémorisation de données et procédé pour l'interaction d'informations de sécurité - Google Patents
Système de mémorisation de données et procédé pour l'interaction d'informations de sécurité Download PDFInfo
- Publication number
- EP2741214A1 EP2741214A1 EP12820499.7A EP12820499A EP2741214A1 EP 2741214 A1 EP2741214 A1 EP 2741214A1 EP 12820499 A EP12820499 A EP 12820499A EP 2741214 A1 EP2741214 A1 EP 2741214A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- security information
- storage device
- information storage
- unlock
- data storage
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000013500 data storage Methods 0.000 title claims abstract description 90
- 230000003993 interaction Effects 0.000 title claims abstract description 84
- 238000000034 method Methods 0.000 title claims abstract description 45
- 238000004891 communication Methods 0.000 claims description 17
- 230000000977 initiatory effect Effects 0.000 claims description 7
- 230000004044 response Effects 0.000 claims description 3
- 230000008569 process Effects 0.000 abstract description 4
- 238000010586 diagram Methods 0.000 description 4
- 238000013459 approach Methods 0.000 description 3
- 102100036462 Delta-like protein 1 Human genes 0.000 description 2
- 101000928537 Homo sapiens Delta-like protein 1 Proteins 0.000 description 2
- 101100499376 Xenopus laevis dll2 gene Proteins 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 238000013519 translation Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/305—Authentication, i.e. establishing the identity or authorisation of security principals by remotely controlling device operation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2147—Locking files
Definitions
- the present invention relates to a data storage system and method, and more particularly, to a data storage system and method used for the security information interaction.
- the existing security data storage systems include the following two implementation approach: (1) both a user password and an unlock password are used in the security data storage system (including a security data storage device), said user password is used for authenticating the identity of the user of the security data storage device, and said unlock password is used for unlocking the security data storage device (when the number of times that the error user passwords are entered continuously reach a predetermined number of times, said security data storage device is locked automatically), so as to cause said user password to recovery to an initial state, wherein, the user password of said security data storage device is initialized by the manufacturer and can be reset by the user, whereas the unlock passwords are all the same (for example, the USBKeys belonging to the same batch have the same unlock passwords); (2) the initialization and reset of the user password are not supported (for example, the PIN code is not
- the first implementation approach described above has the following problems: due to the unlock passwords are all the same, once the unlock password has been divulged, then any security data storage device can be unlocked, thus there exist largely potential security risks.
- the second implementation approach described above has the following problems: the use cost of the user increases (for example, once the security data storage device is locked, a new security data storage device needs to be used), and the complexity of use is significantly increased (for example, to re-download new security information data).
- the present invention proposes a data storage system and method used for the security information interaction.
- said original parameters are at least one factor being capable of uniquely identifying said security information storage device.
- said original parameters are the identifier of said security information storage device.
- said data information related to the security information interaction include an unlock password, a user password and business authentication data.
- said security information storage device further comprises:
- said security information storage device further comprises an information reset module.
- Said information reset module is used to initialize the predetermined items in said data information related to the security information interaction when said security information storage device is unlocked.
- said data communication interface is a USB interface.
- said unlock password generating device further comprises:
- said first dynamic link library is set by a service provider or the relevant third party.
- said unlock server further comprises:
- said second dynamic link library is set by the manufacturer of said security information storage device.
- said security information storage device is a USBKey.
- said original parameters are at least one factor being capable of uniquely identifying said security information storage device.
- said original parameters are the identifier of said security information storage device.
- said security information is business authentication data.
- said data storage method used for the security information interaction further comprises:
- said step (A2) further comprises: initializing predetermined items when said security information storage device is unlocked.
- said data communication interface is a USB interface.
- said step (A1) further comprises:
- said first dynamic link library is set by a service provider or the relevant third party.
- said step (A2) further comprises:
- said second dynamic link library is set by the manufacturer of said security information storage device.
- said security information storage device is a USBKey.
- the data storage system and method used for the security information interaction disclosed in the present invention have the following advantages: (1) since different security information storage devices have different unlock passwords, the potential security risks due to the divulgement of the unlock passwords are reduced; (2) the complexity of the unlock process is reduced, and the maintain cost of the user for the security information storage device is reduced at the same time; (3) since said first dynamic link library and said second dynamic link library are set by different providers, the details (e.g., which key algorithm is adopted) of generating and writing the unlock password are not visible to the external, thereby further reducing the potential security risks existed in the generating and writing process of the unlock password on the whole.
- FIG. 1 is a schematic structure diagram of the data storage system used for the security information interaction according to the embodiment of the present invention.
- the data storage system used for the security information interaction disclosed in the present invention comprises a security information storage device 1, an unlock password generating device 2 and an unlock server 3.
- Said security information storage device 1 is used to store and provide the data information related to the security information interaction.
- Said unlock password generating device 2 is used to generate the unlock password corresponding to said security information storage device 1 based on the original parameters extracted from said security information storage device 1, and to write said unlock password into said security information storage device 1.
- Said unlock server 3 is used to generate the unlock password corresponding to said security information storage device 1 based on the original parameters acquired from said security information storage device 1 when said security information storage device 1 is locked, and to use said unlock password to unlock said locked security information storage device 1.
- said original parameters are at least one factor being capable of uniquely identifying said security information storage device 1.
- said original parameters are the identifier (i.e., ID) of said security information storage device 1.
- said data information related to the security information interaction include an unlock password, a user password and business authentication data (e.g. a digital certificate, a dynamic password or the like).
- business authentication data e.g. a digital certificate, a dynamic password or the like.
- said security information storage device 1 further comprises a data communication interface 5, an unlock password initialization module 6, an unlock module 7, a locking module 8 and a data storage module 9.
- Said data communication interface 5 is used to complete the data communication with external devices.
- Said unlock password initialization module 6 is used to provide the original parameters corresponding to said security information storage device 1 in response to an original parameters extracting request message from said unlock password generating device 2, and to store the generated unlock password from said unlock password generating device 2 into said data storage module 9.
- Said unlock module 7 is used to provide the original parameters corresponding to said security information storage device 1 according to an original parameters extracting request message from said unlock server 3, and to unlock said security information storage device 1 based on the unlock password in the unlock request message from said unlock server 3.
- Said locking module 8 is used to lock said security information storage device 1 when a predetermined condition is satisfied (exemplarily, said predetermined condition is that the number of times that the error user passwords are entered continuously reaches a predetermined number of times).
- Said data storage module 9 is used to store said data information related to the security information interaction.
- said security information storage device 1 further comprises an information reset module 15.
- Said information reset module 15 is used to initialize the predetermined items in said data information related to the security information interaction when said security information storage device 1 is unlocked (exemplarily, said predetermined items are user passwords).
- said data communication interface 5 is a USB interface.
- said unlock password generating device 2 further comprises an original parameters extracting module 10 and a password generating module 11.
- Said original parameters extracting module 10 is used to send said original parameters extracting request message to said security information storage device 1, and to transmit the original parameters acquired from said security information storage device 1 to said password generating module 11.
- Said password generating module 11 is used to generate an unlock password corresponding to said security information storage device 1 based on said original parameters and by means of invoking a first dynamic link library (key algorithm dynamic link library DLL1), and to transmit the generated unlock password to said security information storage device 1.
- said first dynamic link library is set by a service provider (e.g. a bank) or the relevant third party (i.e., said first dynamic link library is provided by a service provider or the relevant third party).
- a service provider e.g. a bank
- the relevant third party i.e., said first dynamic link library is provided by a service provider or the relevant third party.
- said unlock server 3 further comprises an original parameters acquiring module 12, an unlock password generating module 13 and an unlock initiating module 14.
- Said original parameters acquiring module 12 is used to send an original parameters extracting request message to said security information storage device 1, and to transmit the original parameters acquired from said security information storage device 1 to said unlock password generating module 13.
- Said unlock password generating module 13 is used to generate an unlock password corresponding to said security information storage device 1 based on said original parameters and by means of invoking the second dynamic link library (an unlock dynamic link library DLL2), and to transmit the generated unlock password to said unlock initiating module 14.
- Said unlock initiating module 14 is used to configure an unlock request message based on said generated unlock password, and to transmit said unlock request message to said security information storage device 1.
- said second dynamic link library is set by the manufacturer of said security information storage device 1 (i.e., said second dynamic link library is provided by the manufacturer of said security information storage device 1).
- said external devices include a user terminal 4, the unlock password generating device 2 and the unlock server 3.
- said security information storage device 1 is a USBKey.
- the basic operational principle of the data storage system used for the security information interaction disclosed in the present invention is as follows: the manufacturer of said security information storage device 1 invokes said first dynamic link library based on the original parameters extracted from said security information storage device 1 and by means of using the unlock password generating device 2, so as to generate an unlock password corresponding to said security information storage device 1, and to write said unlock password into said security information storage device 1; when said security information storage device 1 is locked (for example, the number of times that the error user passwords are entered continuously reaches a predetermined number of times), said unlock server 3 invokes said second dynamic link library based on the original parameters acquired from said security information storage device 1, so as to generate an unlock password corresponding to said security information storage device 1, and to use said unlock password to unlock said locked security information storage device 1; when said security information storage device 1 is in a non-locked state, said security information storage device 1 can communicate with said user terminal 4 via said data communication interface 5, so as to complete the interaction of the security information related to businesses (for example, the authentication of the security data
- FIG. 2 is a flow diagram of the data storage method used for the security information interaction according to the embodiment of the present invention.
- the data storage method used for the security information interaction disclosed in the present invention comprises the following steps: (A1) an unlock password generating device generating an unlock password corresponding to a security information storage device based on the original parameters extracted from said security information storage device, and writing said unlock password into said security information storage device; (A2) an unlock server generating an unlock password corresponding to said security information storage device based on the original parameters acquired from said security information storage device when said security information storage device is locked, and using said unlock password to unlock said locked security information storage device; (A3) said security information storage device communicating with a user terminal via a data communication interface when said security information storage device is in a non-locked state, so as to complete the interaction of the security information (for example, the authentication of the security data in the financial transaction).
- said original parameters are at least one factor being capable of uniquely identifying said security information storage device.
- said original parameters are the identifier (i.e., ID) of said security information storage device.
- said security information is business authentication data (e.g. a digital certificate, a dynamic password or the like).
- the data storage method used for the security information interaction disclosed in the present invention further comprises: (A4) locking said security information storage device when a predetermined condition is satisfied (exemplarily, said predetermined condition is that the number of times that the error user passwords are entered continuously reaches a predetermined number of times).
- said step (A2) further comprises: initializing the predetermined items when said security information storage device is unlocked (exemplarily, said predetermined items are user passwords).
- said data communication interface is a USB interface.
- said step (A1) further comprises: (B1) sending an original parameters extracting request message to said security information storage device, so as to acquire the original parameters from said security information storage device; and (B2) generating an unlock password corresponding to said security information storage device based on said original parameters and by means of invoking the first dynamic link library (key algorithm dynamic link library DLL1), and transmitting the generated unlock password to said security information storage device.
- B1 sending an original parameters extracting request message to said security information storage device, so as to acquire the original parameters from said security information storage device
- B2 generating an unlock password corresponding to said security information storage device based on said original parameters and by means of invoking the first dynamic link library (key algorithm dynamic link library DLL1), and transmitting the generated unlock password to said security information storage device.
- said first dynamic link library is set by a service provider (e.g. a bank) or the relevant third party (i.e., said first dynamic link library is provided by a service provider or the relevant third party).
- a service provider e.g. a bank
- the relevant third party i.e., said first dynamic link library is provided by a service provider or the relevant third party.
- said step (A2) further comprises: (C1) sending an original parameters extracting request message to said security information storage device, so as to acquire the original parameters from said security information storage device; (C2) generating an unlock password corresponding to said security information storage device based on said original parameters and by means of invoking the second dynamic link library (an unlock dynamic link library DLL2); and (C3) configuring an unlock request message based on the generated unlock password, and transmitting said unlock request message to said security information storage device.
- said second dynamic link library is set by the manufacturer of said security information storage device (i.e., said second dynamic link library is provided by the manufacturer of said security information storage device 1).
- said security information storage device is a USBKey.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011102200507A CN102915414A (zh) | 2011-08-02 | 2011-08-02 | 用于安全性信息交互的数据存储系统及方法 |
PCT/CN2012/079562 WO2013017093A1 (fr) | 2011-08-02 | 2012-08-02 | Système de mémorisation de données et procédé pour l'interaction d'informations de sécurité |
Publications (3)
Publication Number | Publication Date |
---|---|
EP2741214A1 true EP2741214A1 (fr) | 2014-06-11 |
EP2741214A4 EP2741214A4 (fr) | 2015-03-11 |
EP2741214B1 EP2741214B1 (fr) | 2020-09-23 |
Family
ID=47613777
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP12820499.7A Active EP2741214B1 (fr) | 2011-08-02 | 2012-08-02 | Système de mémorisation de données et procédé pour l'interaction d'informations de sécurité |
Country Status (5)
Country | Link |
---|---|
US (1) | US9705875B2 (fr) |
EP (1) | EP2741214B1 (fr) |
JP (1) | JP5860146B2 (fr) |
CN (1) | CN102915414A (fr) |
WO (1) | WO2013017093A1 (fr) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014143009A1 (fr) * | 2013-03-15 | 2014-09-18 | Intel Corporation | Révocation de clé dans des dispositifs à système sur puce |
CN104219196B (zh) * | 2013-05-29 | 2018-12-18 | 腾讯科技(深圳)有限公司 | 业务锁定方法、业务解锁方法、装置及系统 |
CN104917763B (zh) * | 2015-06-08 | 2018-04-27 | 飞天诚信科技股份有限公司 | 一种pin码缓存方法 |
US10382201B1 (en) * | 2015-09-22 | 2019-08-13 | Seagate Technology Llc | Removable circuit for unlocking self-encrypting data storage devices |
US10460110B1 (en) | 2017-02-17 | 2019-10-29 | Seagate Technology Llc | Systems and methods for unlocking self-encrypting data storage devices |
US10678953B1 (en) | 2017-04-26 | 2020-06-09 | Seagate Technology Llc | Self-contained key management device |
US10855451B1 (en) | 2017-08-02 | 2020-12-01 | Seagate Technology Llc | Removable circuit for unlocking self-encrypting data storage devices |
US11120151B1 (en) | 2017-08-02 | 2021-09-14 | Seagate Technology Llc | Systems and methods for unlocking self-encrypting data storage devices |
US10812267B2 (en) * | 2018-11-05 | 2020-10-20 | International Business Machines Corporation | Secure password lock and recovery |
CN117668936B (zh) * | 2024-01-31 | 2024-07-09 | 荣耀终端有限公司 | 数据处理方法及相关装置 |
Family Cites Families (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3964771B2 (ja) | 2002-10-11 | 2007-08-22 | 株式会社豊田中央研究所 | 路面状態推定装置、及び該装置を備えた車両の運動制御装置 |
JP4170723B2 (ja) | 2002-10-23 | 2008-10-22 | 大日本印刷株式会社 | ロック解除方法およびシステム |
US8065717B2 (en) * | 2002-11-27 | 2011-11-22 | Activcard | Automated security token administrative services |
CN100504818C (zh) * | 2003-07-07 | 2009-06-24 | 巨视股份有限公司 | 调控对非易失性存储区访问的方法和判定访问的自动方法 |
WO2005059727A1 (fr) * | 2003-12-17 | 2005-06-30 | Matsushita Electric Industrial Co., Ltd. | Procedes et appareils permettant de distribuer un groupe de parametres systeme secrets et un groupe de cles intermediaires cryptees afin de generer des cles de cryptage et decryptage de contenu |
US7546587B2 (en) * | 2004-03-01 | 2009-06-09 | Microsoft Corporation | Run-time call stack verification |
US7552341B2 (en) * | 2004-09-01 | 2009-06-23 | Microsoft Corporation | Licensing the use of software on a particular CPU |
KR20070100297A (ko) * | 2004-12-20 | 2007-10-10 | 코닌클리케 필립스 일렉트로닉스 엔.브이. | 보호된 휴대용 저장 매체의 잠금해제 |
US20060176146A1 (en) * | 2005-02-09 | 2006-08-10 | Baldev Krishan | Wireless universal serial bus memory key with fingerprint authentication |
US7758422B2 (en) * | 2005-04-13 | 2010-07-20 | Microsoft Corporation | Hard drive authentication |
JP2007249507A (ja) | 2006-03-15 | 2007-09-27 | Hitachi Software Eng Co Ltd | 情報漏洩防止方法、情報漏洩防止システム及び情報端末 |
EP1965342A1 (fr) * | 2007-02-27 | 2008-09-03 | Nagracard S.A. | Procédé pour effectuer une transaction entre un module de paiement et un module de sécurité |
US8832453B2 (en) * | 2007-02-28 | 2014-09-09 | Red Hat, Inc. | Token recycling |
JP4867760B2 (ja) * | 2007-03-30 | 2012-02-01 | ソニー株式会社 | 情報処理装置および方法、並びに情報処理システム |
CN101796525A (zh) * | 2007-08-28 | 2010-08-04 | 松下电器产业株式会社 | 电子设备、解锁方法和程序 |
US8219803B2 (en) * | 2008-10-20 | 2012-07-10 | Disney Enterprises, Inc. | System and method for unlocking content associated with media |
US9112702B2 (en) * | 2009-04-29 | 2015-08-18 | Microsoft Technology Licensing, Llc | Alternate authentication |
US8670748B2 (en) * | 2009-05-01 | 2014-03-11 | Apple Inc. | Remotely locating and commanding a mobile device |
CN102082785A (zh) * | 2010-11-24 | 2011-06-01 | 蓝帽子(厦门)文化传播有限公司 | 线上线下游戏数据交互传输的认证加密装置及其认证方法 |
-
2011
- 2011-08-02 CN CN2011102200507A patent/CN102915414A/zh active Pending
-
2012
- 2012-08-02 EP EP12820499.7A patent/EP2741214B1/fr active Active
- 2012-08-02 JP JP2014523188A patent/JP5860146B2/ja active Active
- 2012-08-02 US US14/235,781 patent/US9705875B2/en active Active
- 2012-08-02 WO PCT/CN2012/079562 patent/WO2013017093A1/fr active Application Filing
Also Published As
Publication number | Publication date |
---|---|
JP2014522047A (ja) | 2014-08-28 |
US20140237569A1 (en) | 2014-08-21 |
WO2013017093A1 (fr) | 2013-02-07 |
EP2741214B1 (fr) | 2020-09-23 |
JP5860146B2 (ja) | 2016-02-16 |
US9705875B2 (en) | 2017-07-11 |
CN102915414A (zh) | 2013-02-06 |
EP2741214A4 (fr) | 2015-03-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2741214A1 (fr) | Système de mémorisation de données et procédé pour l'interaction d'informations de sécurité | |
US11683187B2 (en) | User authentication with self-signed certificate and identity verification and migration | |
US9930040B2 (en) | System and method for provisioning a security token | |
BRPI0722174A2 (pt) | Método e sistema para autenticar usuários em um sistema de processamento de dados. | |
CN114868123A (zh) | 非接触式卡个人标识系统 | |
US10594685B2 (en) | User selected key authentication | |
CN107113613B (zh) | 服务器、移动终端、网络实名认证系统及方法 | |
EP2894891A2 (fr) | Jeton mobile | |
CN101582886A (zh) | 基于动态口令进行身份认证的方法和系统 | |
US7761468B2 (en) | Supporting multiple security mechanisms in a database driver | |
CN109033848A (zh) | 存储数据安全运行方法及系统 | |
CN101714920A (zh) | 集中多服务帐号的权限管理系统及其方法 | |
EP3343494A1 (fr) | Signature électronique de transactions entre des utilisateurs et des fournisseurs distants par l'utilisation de codes bidimensionnels | |
Sanchez‐Reillo et al. | Developing standardised network‐based biometric services | |
Pernpruner et al. | The Good, the Bad and the (Not So) Ugly of Out-of-Band Authentication with eID Cards and Push Notifications: Design, Formal and Risk Analysis | |
Gurav et al. | Remote client authentication using mobile phone generated OTP | |
CN110782193A (zh) | 用于管理对象配送的方法、设备和计算机可读介质 | |
WO2018017019A1 (fr) | Dispositif et procédé de sécurité personnelle | |
CN103457730A (zh) | 安全性信息交互装置及方法和用于安全性信息交互的ic卡 | |
CN115271689A (zh) | 数字资产找回的方法及相关设备 | |
Tschofenig | Web Cryptography: Supporting the FIDO Protocol Family |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20140122 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
DAX | Request for extension of the european patent (deleted) | ||
A4 | Supplementary search report drawn up and despatched |
Effective date: 20150206 |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: G06F 21/31 20130101ALI20150202BHEP Ipc: G06F 21/78 20130101ALI20150202BHEP Ipc: G06F 12/14 20060101AFI20150202BHEP Ipc: G06F 21/34 20130101ALI20150202BHEP |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
17Q | First examination report despatched |
Effective date: 20161209 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R079 Ref document number: 602012072491 Country of ref document: DE Free format text: PREVIOUS MAIN CLASS: G06F0012140000 Ipc: G06F0021300000 |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: GRANT OF PATENT IS INTENDED |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: G06F 21/78 20130101ALI20200430BHEP Ipc: G06F 21/31 20130101ALI20200430BHEP Ipc: G06F 12/14 20060101ALI20200430BHEP Ipc: H04L 29/06 20060101ALI20200430BHEP Ipc: G06F 21/34 20130101ALI20200430BHEP Ipc: G06F 21/30 20130101AFI20200430BHEP |
|
INTG | Intention to grant announced |
Effective date: 20200518 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE PATENT HAS BEEN GRANTED |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: EP |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R096 Ref document number: 602012072491 Country of ref document: DE Ref country code: AT Ref legal event code: REF Ref document number: 1317106 Country of ref document: AT Kind code of ref document: T Effective date: 20201015 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20201224 Ref country code: SE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200923 Ref country code: BG Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20201223 Ref country code: NO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20201223 Ref country code: FI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200923 Ref country code: HR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200923 |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: MK05 Ref document number: 1317106 Country of ref document: AT Kind code of ref document: T Effective date: 20200923 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: RS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200923 Ref country code: LV Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200923 |
|
REG | Reference to a national code |
Ref country code: NL Ref legal event code: MP Effective date: 20200923 |
|
REG | Reference to a national code |
Ref country code: LT Ref legal event code: MG4D |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200923 Ref country code: PT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20210125 Ref country code: NL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200923 Ref country code: SM Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200923 Ref country code: RO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200923 Ref country code: EE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200923 Ref country code: CZ Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200923 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: AL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200923 Ref country code: AT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200923 Ref country code: ES Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200923 Ref country code: IS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20210123 Ref country code: PL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200923 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R097 Ref document number: 602012072491 Country of ref document: DE |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200923 |
|
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200923 Ref country code: DK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200923 |
|
26N | No opposition filed |
Effective date: 20210624 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200923 |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: PL |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MC Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200923 |
|
REG | Reference to a national code |
Ref country code: BE Ref legal event code: MM Effective date: 20210831 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LI Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20210831 Ref country code: CH Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20210831 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LU Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20210802 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20210802 Ref country code: BE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20210831 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: HU Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO Effective date: 20120802 Ref country code: CY Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200923 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200923 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GB Payment date: 20240627 Year of fee payment: 13 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200923 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 20240625 Year of fee payment: 13 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: FR Payment date: 20240702 Year of fee payment: 13 |